基于参数化游标的Web数据库访问控制机制

Z. Jan, Muhammad Shah, Azhar Rauf, Mohd Shoaib Amir Khan, Saeed Mahfooz
{"title":"基于参数化游标的Web数据库访问控制机制","authors":"Z. Jan, Muhammad Shah, Azhar Rauf, Mohd Shoaib Amir Khan, Saeed Mahfooz","doi":"10.1109/FUTURETECH.2010.5482721","DOIUrl":null,"url":null,"abstract":"Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the most dangerous threats to web applications. SQL Injection technique is mostly an attack on data driven web applications. By providing especially built user input through the web form fields, the attacker can access and modify the contents of the underlying database of a web application. This research work presents a technique, which will be used for the detection and prevention from SQL Injection. The parameterized cursor is used to implement the concept. The user session information will be passed as a parameter to cursor. If the user is an authorized user then the cursor will fetch the desired tuples else will fail to execute. This research work can easily be adopted and implemented in any platform and database. An example application is developed in Oracle Internet Developer suite 10g and Oracle Database 10g to test the performance against SQL Injection.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Access Control Mechanism For Web Databases By Using Parameterized Cursor\",\"authors\":\"Z. Jan, Muhammad Shah, Azhar Rauf, Mohd Shoaib Amir Khan, Saeed Mahfooz\",\"doi\":\"10.1109/FUTURETECH.2010.5482721\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the most dangerous threats to web applications. SQL Injection technique is mostly an attack on data driven web applications. By providing especially built user input through the web form fields, the attacker can access and modify the contents of the underlying database of a web application. This research work presents a technique, which will be used for the detection and prevention from SQL Injection. The parameterized cursor is used to implement the concept. The user session information will be passed as a parameter to cursor. If the user is an authorized user then the cursor will fetch the desired tuples else will fail to execute. This research work can easily be adopted and implemented in any platform and database. An example application is developed in Oracle Internet Developer suite 10g and Oracle Database 10g to test the performance against SQL Injection.\",\"PeriodicalId\":380192,\"journal\":{\"name\":\"2010 5th International Conference on Future Information Technology\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 5th International Conference on Future Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FUTURETECH.2010.5482721\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 5th International Conference on Future Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FUTURETECH.2010.5482721","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

Web应用程序在提供各种在线设施方面获得了巨大的普及,例如电子购物、电子银行、电子票务、电子学习等。随着web应用程序使用的增长,针对web应用程序的攻击也在增加。在这些攻击技术中,SQL注入已经成为对web应用程序最危险的威胁之一。SQL注入技术主要是针对数据驱动的web应用程序的攻击。通过通过web表单字段提供特别构建的用户输入,攻击者可以访问和修改web应用程序底层数据库的内容。本研究提出了一种用于检测和预防SQL注入的技术。参数化游标用于实现该概念。用户会话信息将作为参数传递给游标。如果用户是授权用户,则游标将获取所需的元组,否则将执行失败。本研究工作可以方便地在任何平台和数据库中采用和实现。在Oracle Internet Developer suite 10g和Oracle Database 10g中开发了一个示例应用程序来测试SQL注入的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Access Control Mechanism For Web Databases By Using Parameterized Cursor
Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the most dangerous threats to web applications. SQL Injection technique is mostly an attack on data driven web applications. By providing especially built user input through the web form fields, the attacker can access and modify the contents of the underlying database of a web application. This research work presents a technique, which will be used for the detection and prevention from SQL Injection. The parameterized cursor is used to implement the concept. The user session information will be passed as a parameter to cursor. If the user is an authorized user then the cursor will fetch the desired tuples else will fail to execute. This research work can easily be adopted and implemented in any platform and database. An example application is developed in Oracle Internet Developer suite 10g and Oracle Database 10g to test the performance against SQL Injection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信